咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,464 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 1,017 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 285 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,073 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2532 条 记 录,以下是221-230 订阅
排序:
Real Time Smart Forest Fire Detection and Monitoring System Using IoT and Machine Learning
Real Time Smart Forest Fire Detection and Monitoring System ...
收藏 引用
International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)
作者: Khushal A Kishore A Tejas Neswi Mohana K Badarinath Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India Computer Science and Engineering RV College of Engineering® Bengaluru India
According to the National Interagency Fire Center (NIFC) forest fires pose a major threat to our planet, causing severe ecological, economic, and human loss, with an estimated 7 million acres of forest burned annually... 详细信息
来源: 评论
VHASR: A Multimodal Speech Recognition System With Vision Hotwords
VHASR: A Multimodal Speech Recognition System With Vision Ho...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Hu, Jiliang Li, Zuchao Wang, Ping Ai, Haojun Zhang, Lefei Zhao, Hai Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China School of Computer Science Wuhan University Wuhan China School of Information Management Wuhan University Wuhan China Department of Computer Science and Engineering Shanghai Jiao Tong University China
The image-based multimodal automatic speech recognition (ASR) model enhances speech recognition performance by incorporating audio-related image. However, some works suggest that introducing image information to model... 详细信息
来源: 评论
A Novel Framework for Scalable Video Transmission Based on the Outage Probability Analysis of MIMO Coding  4
A Novel Framework for Scalable Video Transmission Based on t...
收藏 引用
4th Information Communication Technologies Conference, ICTC 2023
作者: Zhang, Yongjian Wang, Dongyu Zhang, Zhiqiang Wang, Shiguo University of International Relations School of Cyber Science and Engineering Beijing China North China University of Technology Department of Electronic Engineering Beijing China Shanxi Police College Department of Cyber Security Taiyuan China University of Science and Technology Computer and Communication Engineering Institute Changsha Changsha China
This work presents a radical approach for space-time codings, which could realize the goal of unequal error protection (UEP) transmitting for scalable video. This analysis leads us to develop a hybrid coding framework... 详细信息
来源: 评论
Forensic Analysis of I2P Communication Network in Android and macOS Environments  18
Forensic Analysis of I2P Communication Network in Android an...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Wangchuk, Tashi Mandela, Ngaira Mbinda, Tumaini Damedjate, Kamboisssoi Etyang, Felix Makopa, Joel Royal University of Bhutan Department of Information Technology Dewathang Bhutan National Forensic Sciences University School of Cyber Security and Digital Forensics Gandhinagar India Cochin University of Science and Technology School of Computer Science and Engineering Kochi India
The Invisible Internet Project (I2P) has emerged as a crucial privacy-centric communication network, offering users a secure and anonymous online environment. As the utilization of I2P continues to expand, the demand ... 详细信息
来源: 评论
Multiclass Brain Tumor Detection using Convolutional Neural Network and Conventional Machine Learning  2
Multiclass Brain Tumor Detection using Convolutional Neural ...
收藏 引用
2nd IEEE International Conference on Emerging Research in Computational science, ICERCS 2024
作者: Vidhya, K. Vamsi Krishna, B. Haritha, M. Rajasekaran, Arun Sekar Roopa Chandrika, R. Velusamy, Jayaraj Karunya Institute of Technology and Sciences Division of Data Science and Cyber Security School of Computer Science and Technology Coimbatore India QIS College of Engineering and Technology Department of AIMLDS Andhra Pradesh India QIS College of Engineering and Technology Department of Mechanical Engineering Andhra Pradesh India SR University Department of Electronics and Communication Engineering Telangana India Karpagam Academy of Higher Education Department of Cyber Security Coimbatore India Nehru Institute of Engineering and Technology Department of Electronics and Communication Engineering Coimbatore India
Brain tumor (BT) affect the brain and reduce the lifespan of humans. Therefore, diagnosis and treatment of illnesses in its early stage is required. The objective of this paper is to evaluate the effectiveness of the ... 详细信息
来源: 评论
Comparative Analysis of Machine Learning Algorithms and Datasets for Detecting cyberbullying on Social Media Platforms
Comparative Analysis of Machine Learning Algorithms and Data...
收藏 引用
2024 International Conference on Computing and Intelligent Reality Technologies, ICCIRT 2024
作者: Palagati, Anusha Balan, Santhosh Kumar Arun Joe Babulo, S. Raja, Laxmi Natarajan, K.K. Kalimuthu, Rajkumar Dept. of Computer Science and Engineering Guru Nanak Institute of Technology Ibrahimpatnam Hyderabad India Department of Computer Applications K.S.R College of Arts and Science for Women Tamilnadu Tiruchengode India Department of Cyber Security Karpagam Academy of Higher Education Tamilnadu Coimbatore India College of Engineering and Technology University of Technology and Applied Sciences Al Mussanah Oman Department of Cyber Security Guru Nanak Institute of Technology Ibrahimpatnam Hyderabad India
cyberbullying is defined as sharing of undesirable material in the cyberspace, primarily- the use of the social sites that instigate hostility and create feelings of hatred among the individuals. Another increasing th... 详细信息
来源: 评论
An Effective Span-based Multimodal Named Entity Recognition with Consistent Cross-Modal Alignment  30
An Effective Span-based Multimodal Named Entity Recognition ...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Xu, Yongxiu Xu, Hao Huang, Heyan Cui, Shiyao Tang, Minghao Wang, Longzheng Xu, Hongbo Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computer Science and Technology Beijing Institute of Technology Beijing China
With the increasing availability of multimodal content on social media, consisting primarily of text and images, multimodal named entity recognition (MNER) has gained a wide-spread attention. A fundamental challenge o... 详细信息
来源: 评论
A stacked ensemble approach to detect cyber attacks based on feature selection techniques
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 316-331页
作者: Urmi, Wahida Ferdose Uddin, Mohammed Nasir Uddin, Md Ashraf Talukder, Md. Alamin Hasan, Md. Rahat Paul, Souvik Chanda, Moumita Ayoade, John Khraisat, Ansam Hossen, Rakib Imran, Faisal Department of Computer Science and Engineering Jagannath University Dhaka Bangladesh Department of Computer Science and Engineering International University of Business Agriculture and Technology Dhaka Bangladesh School of Information Technology Deakin University Waurn Ponds Campus Geelong Australia School of Information Technology Crown Institute of Higher Education 116 Pacific Highway North SydneyNSW2060 Australia Department of Cyber Security Bangabandhu Sheikh Mujibur Rahman Digital University Kaliakoir Gazipur1750 Bangladesh Department of Electrical and Computer Engineering University of Ottawa Canada
The exponential growth of data and increased reliance on interconnected systems have heightened the need for robust network security. cyber-Attack Detection Systems (CADS) are essential for identifying and mitigating ... 详细信息
来源: 评论
PRESS: Defending Privacy in Retrieval-Augmented Generation via Embedding Space Shifting
PRESS: Defending Privacy in Retrieval-Augmented Generation v...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: He, Jiaming Liu, Cheng Hou, Guanyu Jiang, Wenbo Li, Jiachen School of Computer Science and Engineering University of Electronic Science and Technology of China China College of Computer Science and Cyber Security Oxford Brookes College Chengdu University of Technology China School of Data Science The Chinese University of Hong Kong Shenzhen China School of Computer Science and Artificial Intelligence Wuhan University of Technology China
Retrieval-augmented generation (RAG) expands the capabilities of large language models (LLMs) in various applications by integrating relevant information retrieved from external data sources. However, the RAG systems ...
来源: 评论
Advance Public Bus Transport Management System: An Innovative Smart Bus Concept
Advance Public Bus Transport Management System: An Innovativ...
收藏 引用
2024 IEEE International Conference on Consumer Electronics, ICCE 2024
作者: Patel, Keyurkumar Patel, Divya Chaudhary, Nishit Thakkar, Darsh Savaliya, Pratham Mistry, Armaan Rashtriya Raksha University Artificial Intelligence and Cyber Security Department of IT Gujarat Gandhinagar382305 India Karnavati University Unitedworld School of Computational Intelligence Department of Computer Science and Engineering Gujarat Gandhinagar382422 India
In the present era, public bus transportation services often lag behind in adopting modern technologies, resulting in numerous operational complexities. These issues encompass challenges such as poor passenger density... 详细信息
来源: 评论