咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,466 篇 工学
    • 1,206 篇 计算机科学与技术...
    • 1,019 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 593 篇 理学
    • 287 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,080 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2539 条 记 录,以下是241-250 订阅
排序:
Text Summarization Generation Based on Improved Transformer Model
Text Summarization Generation Based on Improved Transformer ...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on cyber science and Technology Congress, DASC/PiCom/CBDCom/cyberSciTech 2023
作者: Lin, Jingsong Guo, Xiaodong Dong, Chen Lyu, Chenxi Xu, Li Chen, Zhenyi College of Computer and Data Science Fuzhou University Fuzhou350116 China College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China University of South Florida Department of Computer Science and Engineering TampaFL33620 United States
In the era of big data, the number of internet users is increasing yearly, and each user receives a massive amount of information every day. The low-value density of massive text data makes it difficult to utilize its... 详细信息
来源: 评论
Personalized Federated Learning for Heterogeneous Residential Load Forecasting
收藏 引用
Big Data Mining and Analytics 2023年 第4期6卷 421-432页
作者: Xiaodong Qu Chengcheng Guan Gang Xie Zhiyi Tian Keshav Sood Chaoli Sun Lei Cui the Shanxi Key Laboratory of Advanced Control and Equipment Intelligence Taiyuan University of Science and TechnologyTaiyuan 030024China the Faculty of Engineering and Information Technology University of Technology SydneyUltimo 2007Australia the Centre for Cyber Security Research and Innovation Deakin UniversityMelbourne 3125Australia the School of Computer Science and Technology Taiyuan University of Science and TechnologyTaiyuan 030024China
Accurate load forecasting is critical for electricity production,transmission,and *** learning(DL)model has replaced other classical models as the most popular prediction ***,the deep prediction model requires users t... 详细信息
来源: 评论
Multi-residual generative adversarial networks for QR code Deblurring
Multi-residual generative adversarial networks for QR code D...
收藏 引用
2022 International Conference on Electronic Information Technology, EIT 2022
作者: Wang, Mingyue Chen, Kecheng Lin, Fanqiang College of Computer Science and Cyber Security Chengdu University of Technology Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Motion blur and ambient noise are the main reasons that affect quick response (QR) code recognition. In this paper, we propose a novel deep learning approach to deblur the QR codes and realize the effective recognitio... 详细信息
来源: 评论
Neuromorphic-Driven Agentic AI for Autonomous Decision-Making Systems  4
Neuromorphic-Driven Agentic AI for Autonomous Decision-Makin...
收藏 引用
4th IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2024
作者: Manjunath Kamath, K. Samata Mehta, S. Akshaya, H.L. Shilpashree, N. Jadhav, Girish Mitra, Abhijit Department of Cyber Security Karkala India Bengaluru India Sarada Vilas College Department of Computer Science Mysuru India Parul institute of Engineering and Technology Parul University Faculty of Engineering and Technology Department Of Electrical Engineering Post Limda India Pune India
Agentic AI represents a paradigm shift in the development of intelligent systems capable of adaptive and proactive interactions in dynamic and complex environments. By integrating reinforcement learning (RL) with cogn... 详细信息
来源: 评论
Rapid Prototype Development Approach for Genetic Programming
收藏 引用
Journal of computer and Communications 2024年 第2期12卷 67-79页
作者: Pei He Lei Zhang School of Computer Science and Cyber Engineering Guangzhou University Guangzhou China School of Cyberspace Security Guangzhou University Guangzhou China
Genetic Programming (GP) is an important approach to deal with complex problem analysis and modeling, and has been applied in a wide range of areas. The development of GP involves various aspects, including design of ... 详细信息
来源: 评论
Improving Brain Tumor Diagnosis with Deep Learning Algorithms
Improving Brain Tumor Diagnosis with Deep Learning Algorithm...
收藏 引用
Multi-Agent Systems for Collaborative Intelligence (ICMSCI), International Conference on
作者: V Varun Rahul Palanivel Sumathi D Karthika Natarjanv VIT-AP University Guntur India School of Engineering (Cyber Security) School of Computer Science and Engineering (SCOPE)
This paper proposes an innovative approach for brain tumour assessment employing deep learning procedures, specifically integrating the Segment Anything Module (SAM) with the VGG (Visual Geometry Group) architecture. ... 详细信息
来源: 评论
An enhanced LSTM-CRF based approach for Knowledge Integration based Sentiment Analysis
An enhanced LSTM-CRF based approach for Knowledge Integratio...
收藏 引用
International Symposium on Advanced Computing and Communication (ISACC)
作者: Allam Balaram M. SilpaRaj K. Likhitha Sree V. Pramodh Kumar D. Vinay Kumar K. Venu Kumar Reddy Department of Computer Science and Engineering MLR Institute of Technology Hyderabad India Department of Computer Science and Engineering (Cyber Security) CVR College of Engineering Hyderabad India
Sentiment analysis is a key element for expert reviews but is at a loss in terms of detection of sarcasm and irony, which distort the actual sentiments. This paper proposes an approach that will fuse syntactic and con... 详细信息
来源: 评论
A Novel Fast Video Fragment Matching Algorithm for Copyright Protection
A Novel Fast Video Fragment Matching Algorithm for Copyright...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on cyber science and Technology Congress, DASC/PiCom/CBDCom/cyberSciTech 2023
作者: Chen, Yan Yang, Zhongliao Dong, Chen Lin, Hui Chen, Zhenyi College of Computer and Data Science Fuzhou University Fuzhou350108 China College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China University of South Florida Department of Computer Science and Engineering TampaFL33620 United States
The rise of the short-form video industry marks a revolutionary change in the digital media landscape. This has opened up new opportunities for content distribution and creation but has also brought about several chal... 详细信息
来源: 评论
A Deep Learning-based Data Usability Enhancement Scheme for Differential Privacy  9
A Deep Learning-based Data Usability Enhancement Scheme for ...
收藏 引用
9th IEEE Smart World Congress, SWC 2023
作者: Yan, Haonan Li, Xiaoguang Zheng, Gewei Li, Hui Li, Fenghua Lin, Xiaodong Xidian University University of Guelph China Xidian University State Key Laboratory of Isn School of Cyber Engineering Xi'an China University of Cas State Key Laboratory of Information Security Institute of Information Engineering Cas School of Cyber Security Beijing China University of Guelph School of Computer Science Guelph Canada
While differential privacy (DP) is widely used to ensure privacy, it can also significantly reduce data accuracy. Current research attempts to improve accuracy by leveraging post-processing techniques, but these metho... 详细信息
来源: 评论
Data Breaches: Financial and Reputational Impacts of Vulnerabilities on Organizations to Enhance cybersecurity Strategies
Data Breaches: Financial and Reputational Impacts of Vulnera...
收藏 引用
Automation, Computing and Renewable Systems (ICACRS), International Conference on
作者: Aishwarya Gite Ashutosh Joshi Jigyasa Agrawal Tanisha Agarwal Namruth Reddy Mohana Minal Moharir Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India NVIDIA Bengaluru India
In the current digital era, organizations and businesses face increasing vulnerability to cybersecurity threats, with data breaches presenting substantial risks to their operational and financial well-being. Proposed ... 详细信息
来源: 评论