咨询与建议

限定检索结果

文献类型

  • 1,611 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,517 篇 工学
    • 1,251 篇 计算机科学与技术...
    • 1,046 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 607 篇 理学
    • 297 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 60 篇 化学
  • 412 篇 管理学
    • 255 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 126 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 99 篇 machine learning
  • 98 篇 security
  • 82 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 58 篇 support vector m...
  • 58 篇 predictive model...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 49 篇 artificial intel...
  • 47 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,925 篇 英文
  • 664 篇 其他
  • 17 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2596 条 记 录,以下是231-240 订阅
排序:
Circumventing Google Play vetting policies: a stealthy cyberattack that uses incremental updates to breach privacy
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第5期14卷 4785-4794页
作者: Muhammad, Zia Amjad, Faisal Iqbal, Zafar Javed, Abdul Rehman Gadekallu, Thippa Reddy Department of Computer Science North Dakota State University Fargo United States Department of Cyber Security PAF Complex E-9 Air University Islamabad Pakistan Islamabad Pakistan School of Information Technology and Engineering Vellore Institute of Technology Vellore India Department of Electrical and Computer Engineering Lebanese American University Byblos Lebanon
Today digital technologies are evolving to accommodate small businesses and young entrepreneurs by reducing their time-to-market while encouraging rapid innovation in mobile, Extended Reality (XR), Internet of Things ... 详细信息
来源: 评论
Bridging Visual Affective Gap: Borrowing Textual Knowledge by Learning from Noisy Image-Text Pairs  24
Bridging Visual Affective Gap: Borrowing Textual Knowledge b...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Wu, Daiqing Yang, Dongbao Zhou, Yu Ma, Can School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China TMCC College of Computer Science Nankai University Tianjin China
Visual emotion recognition (VER) is a longstanding field that has garnered increasing attention with the advancement of deep neural networks. Although recent studies have achieved notable improvements by leveraging th... 详细信息
来源: 评论
Intelligent Deep Learning Model for Securing KMS Through CSF Deviation Detection  13
Intelligent Deep Learning Model for Securing KMS Through CSF...
收藏 引用
13th International Conference on System Modeling and Advancement in Research Trends, SMART 2024
作者: Chauhan, Raj Ahmad, Shahnawaz Onyarin, Ogala Justin Kumar, Rajendra Noida Institute of Engineering and Technology Department of CSE-AIML Greater Noida India School of Computer Science Engineering and Technology Bennett University Greater Noida India University of Delta Cyber Security Department Delta State Nigeria Jamia Millia Islamia Department of Computer Science New Delhi India
Cloud computing has revolutionized data content stock and administration but concurrently it has increased the vulnerability factors especially Key Management System (KMS), which is crucial since it is used to protect... 详细信息
来源: 评论
Cloud Based AIVR Training System for Emergency Rescue  12
Cloud Based AIVR Training System for Emergency Rescue
收藏 引用
12th International Conference on Advanced Cloud and Big Data, CBD 2024
作者: Dong, Meiya Zhu, Biaokai Zhao, Jumin Song, Jie School of Computer Science Peking University Beijing China Suzhou Industrial Technology Institute Zhejiang University Suzhou China Cyber Security Shanxi Police College China College of Information and Optical Engineering Taiyuan University of Technology Taiyuan China Cyber security Intelligent Policing Key Laboratory of Sichuan Province Luzhou China
This paper mainly discusses the current situation and existing problems of training exercises in emergency medicial scenarios, as well as the importance and necessity of developing an AI training system for emergency ... 详细信息
来源: 评论
Conformal Graph-level Out-of-distribution Detection with Adaptive Data Augmentation  25
Conformal Graph-level Out-of-distribution Detection with Ada...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Lin, Xixun Cao, Yanan Sun, Nan Zou, Lixin Zhou, Chuan Zhang, Peng Zhang, Shuai Zhang, Ge Wu, Jia Institute of Information Engineering Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Cyber Science and Engineering Wuhan University Wuhan China Academy of Mathematics and Systems Science CAS School of Cyber Security University of Chinese Academy of Sciences Beijing China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China Academy of Mathematics and Systems Science CAS Beijing China School of Computer Science and Technology Donghua University Shanghai China Department of Computing Macquarie University Sydney Australia
Graph-level out-of-distribution (OOD) detection, which attempts to identify OOD graphs originated from an unknown distribution, is a vital building block for safety-critical applications in Web and society. Current ap... 详细信息
来源: 评论
IceCache: Recommendation-Based Edge Caching for Life Cycle of Video
IceCache: Recommendation-Based Edge Caching for Life Cycle o...
收藏 引用
2025 IEEE Wireless Communications and Networking Conference, WCNC 2025
作者: Cao, Shaohua Xing, Wanli Zheng, Quancheng Lv, Huaqi Yuan, Xuyang Zhan, Zijun Fang, Kai Hasan, Mohammad Kamrul Zhang, Weishan Qingdao China School of Science and Engineering The Chinese University of HongKong Shenzhen China University of Houston Electrical and Computer Engineering Department HoustonTX United States College of Mathematics and Computer Science Zhejiang A&f University Hangzhou China Universiti Kebangsaan Malaysia Center for Cyber Security Selangor Bangi Malaysia
The surge in Internet video traffic driven by 5G advancement strains network infrastructure. Edge computing emerges as a solution for video distribution, yet faces challenges from limited cache capacity and dynamic us... 详细信息
来源: 评论
Integrating Consortium Blockchain and Attribute-Based Searchable Encryption for Automotive Threat Intelligence Sharing Model  1
收藏 引用
6th International Conference on science of cyber security, SciSec 2024
作者: Xie, Tiange Liu, Feng Gao, Jiechao Wang, Yinghui Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Department of Computer Science University of Virginia CharlottesvilleVA United States School of Transportation Science and Engineering Beihang University Beijing China
Sharing cyber threat intelligence (CTI) enhances organizations’ abilities in threat detection and emergency response, fostering a proactive defense approach of "predict and prevent". Given the sensitive nat... 详细信息
来源: 评论
Machine Learning Approach for Detection of DDOS Attack in Cloud Environment
Machine Learning Approach for Detection of DDOS Attack in Cl...
收藏 引用
Emerging Trends in engineering and Medical sciences (ICETEMS), International Conference on
作者: Harshala Shingne Kartik Vhonale Pratham Shrivastava Purva Gholse Rahul Barlinge Mohammad Amash Alam Computer Science and Engineering-Cyber Security Shri Ramdeobaba College of Engineering and Management Nagpur India
The cloud computing realm faces constant security threats like DDoS attacks, affecting service availability. Existing solutions struggle with efficiency in detection due to their emphasis on accuracy over speed. This ... 详细信息
来源: 评论
Secure and fast mobility handover scheme for IoMT in 5 G and future 6 G networks
收藏 引用
Alexandria engineering Journal 2025年 128卷 127-143页
作者: Islam, Shayla Topazal, S.M. Hasan, Mohammad Kamrul Kolandaisamy, Raenu AL Abbas, Huda Saleh Vo, Nguyen Thakkar, Rahul Khan, Muhammad Attique Gupta, Deepak AlHammadi, Dina Abdulaziz Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia Center for Cyber Security Faculty of Information Science and Technology the National University of Malaysia Selangor Bangi43600 Malaysia Department of computer science College of Computer Science and Engineering Taibah University Madina Saudi Arabia Victorian Institute of Technology Melbourne Australia Center of AI College of Computer Engineering and Science Prince Mohammad Bin Fahd University Al-Khobar Saudi Arabia Maharaja Agrasen Institute of Technology Delhi India Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O.Box 84428 Riyadh11671 Saudi Arabia
The emergence of 5 G and 6 G networks promises significant advancements in the Internet of Medical Things (IoMT) by enabling real-time medical data transmission and continuous connectivity for mobile healthcare device... 详细信息
来源: 评论
Performance Analysis of Three Spectrum Sensing Detection Techniques with Ambient Backscatter Communication in Cognitive Radio Networks
收藏 引用
computer Modeling in engineering & sciences 2023年 第10期137卷 813-825页
作者: Shayla Islam Anil Kumar Budati Mohammad Kamrul Hasan Saoucene Mahfoudh Syed Bilal Hussian Shah Institute of Computer Science&Digital Innovation ICSDIUCSI UniversityKuala Lumpur56000Malaysia Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia(UKM)Selangor43600Malaysia School of Engineering Computing and InformaticsDar Al-Hekma UniversityJeddah22246Saudi Arabia
In wireless communications, the Ambient Backscatter Communication (AmBC) technique is a promisingapproach, detecting user presence accurately at low power levels. At low power or a low Signal-to-Noise Ratio(SNR), ther... 详细信息
来源: 评论