咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,466 篇 工学
    • 1,206 篇 计算机科学与技术...
    • 1,019 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 593 篇 理学
    • 287 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,080 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2539 条 记 录,以下是251-260 订阅
排序:
A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning  20th
A Lossless Relational Data Watermarking Scheme Based on Une...
收藏 引用
20th International Conference on Information security and Cryptology, Inscrypt 2024
作者: Xu, Wenhao Xian, Hequn College of Computer Science and Technology Qingdao University Qingdao266071 China Key Laboratory of Cyberspace Security Defense Institute of Information Engineering Chinese Academy of Sciences Beijing100085 China Cryptograph and Cyber Security Whampoa Institute Guangzhou510000 China
In modern relational databases, data security and integrity are crucial, particularly in large-scale, unevenly distributed big data environments. This paper proposes a lossless relational data watermarking scheme base... 详细信息
来源: 评论
Statistical Analysis of a Deep Learning Based Trimodal Biometric System Using Paired Sampling T-Test
Statistical Analysis of a Deep Learning Based Trimodal Biome...
收藏 引用
2023 International Conference on science, engineering and Business for Sustainable Development Goals, SEB-SDG 2023
作者: Atanda, Oladayo Gbenga Ismaila, Wasiu Afolabi, Adeolu Olabode Awodoye, Olufemi Adeyanju Falohun, Adeleye Samuel Oguntoye, Jonathan Ponmile Landmark University Department of Computer Science Omu-Aran Nigeria Sdg 11 Sustainable Cities and Community Nigeria Lautech Department of Cyber-security Science Ogbomoso Nigeria Lautech Department of Computer Engineering Ogbomoso Nigeria Ajayi Crowther University Department of Computer Engineering Oyo Nigeria
Biometrics of individuals is distinctive to them and is constant over the course of a person's lifespan. A few trimodal biometric systems involving passive biometrics have adopted Convolutional Neural Network (CNN... 详细信息
来源: 评论
Failed Yet Stored: A First Look at DNS Negative Caching
Failed Yet Stored: A First Look at DNS Negative Caching
收藏 引用
2024 IEEE International Performance, Computing, and Communications Conference, IPCCC 2024
作者: Zeng, Meng Zhu, Yujia Li, Baiyang Zhang, Yuedong Liu, Qingyun Fang, Binxing Chinese Academy of Sciences Institute of Information Engineering China University of Chinese Academy of Sciences School of Cyber Security China National Computer Network Emergency Response Technical Team/Coordination of China China School of Computer Science and Technology ShenZhen China
Caching is a critical method for enhancing the efficiency and the security of the Domain Name System (DNS). Initially, only successful domain name resolution results were cached. To mitigate failures in DNS transactio... 详细信息
来源: 评论
Meta Heuristic Image Optimisation in LiDAR Sensor Based on Cloud IoT Network and Deep Learning Algorithms
收藏 引用
Remote Sensing in Earth Systems sciences 2025年 第2期8卷 566-575页
作者: Meenakshi, K. Manoj, Gunna Diwakar, Meenakshi Prabakaran, Manjula Sravan, Padala Babu, Gaddam Ravindra Department of Networking and Communications School of Computing SRM Institute of Science and Technology Kattankulathur Chennai India Cyber Security Marri Laxman Reddy Institute of Technology and Management Telangana Hyderabad India Department of IT Panimalar Engineering College Chennai India Dept of CSE (Data Science) Madanapalle Institute of Technology & Science Andhra Pradesh Angallu India Computer Science and Engineering NIIT with learning partner Hainan Normal University Haikou China Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Telangana Hyderabad India
LiDAR technology has become a vital tool for researching these atmospheric components because of its capacity to measure backscattered signals and investigate the atmosphere at extremely high spatial and temporal reso... 详细信息
来源: 评论
CNN-BO-LSTM: an ensemble framework for prognosis of liver cancer
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第2期17卷 1103-1109页
作者: K N, Sunil Kumar Kashyap, Pavan P. Bhyratae, Darshan A. Bhyratae, Suhas A. Kalaivani, A. Department of ISE Sri Venkateshwara College of Engineering Bangalore India Department of Electronics & amp Communication Engineering Sri Venkateshwara College of Engineering Bangalore India Computer Science and Engineering Sahyadri College of Engineering and Management Mangaluru India Department of MCA New Horizon College of Engineering Marathahalli Bangalore India Department of CSE-Cyber Security Sri Venkateshwara College of Engineering Bangalore India
computer-assisted diagnosis (CAD) is preferred for cancer identification across the globe, which relies on computerized image processing. The creation of previous CAD instruments involved a semi-automated approach tha... 详细信息
来源: 评论
Application of residual network in household waste classification
Application of residual network in household waste classific...
收藏 引用
2023 IEEE International Conference on Control, Electronics and computer Technology, ICCECT 2023
作者: Guo, Yutong Luo, Jie Guo, Weile Chengdu University of Technology College of Computer Science Cyber Security Oxford Brookes College Chengdu China Xi'An University of Architecture and Technology College of Metallurgical Engineering Xi'an China
With the acceleration of urbanization, the amount of garbage has skyrocketed. This makes the burden of sorting waste by manual means heavier and heavier, resulting in a large amount of waste accumulation. In this cont... 详细信息
来源: 评论
Temporal Analysis and Common Weakness Enumeration (CWE) Code Prediction for Software Vulnerabilities Using Machine Learning
Temporal Analysis and Common Weakness Enumeration (CWE) Code...
收藏 引用
International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)
作者: Kishan Karthik S Suraj Singh S Jeevan Namruth Reddy Minal Moharir Mohana Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India NVIDIA Bengaluru India
Zero-day attacks present a significant challenge in cybersecurity by exploiting vulnerabilities that have not been identified yet. This paper leverages the Common Weakness Enumeration (CWE) system—a widely recognized... 详细信息
来源: 评论
PpNNT: Multiparty Privacy-Preserving Neural Network Training System
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第1期5卷 370-383页
作者: Feng, Qi He, Debiao Shen, Jian Luo, Min Choo, Kim-Kwang Raymond Wuhan University School of Cyber Science and Engineering Wuhan430072 China Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China School of Information Science and Technology Zhejiang Sci-Tech University Hangzhou310018 China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai201204 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
By leveraging smart devices [e.g., industrial Internet of Things (IIoT)] and real-time data analytics, organizations, such as production plants can benefit from increased productivity, reduced costs, enhanced self-mon... 详细信息
来源: 评论
Forecasting and managing urban futures: machine learning models and optimization of urban expansion
收藏 引用
Asian Journal of Civil engineering 2024年 第6期25卷 4673-4682页
作者: Abid, Mohammed Talib Aljarrah, Njood Shraa, Tamer Alghananim, Haneen Marouf Department of Architecture College of Engineering Al-Nahrain University Baghdah Iraq Computer Sciences Faculty of Information Technology and Computer Sciences Ajloun National University Ajloun Jordan Faculty of Science and Information Technology Cyber Security Irbid National University Irbid Jordan Faculty of Engineering Architecture Department Ain Shams University Cairo Egypt
This paper presents a novel method for predicting and controlling urban growth by combining convolutional neural networks (CNN) with Spider Monkey Optimization (SMO) to efficiently use their combined capabilities. Thi... 详细信息
来源: 评论
Unveiling the Landscape of Machine Learning and Deep Learning Methodologies in Network security: A Comprehensive Literature Review  2
Unveiling the Landscape of Machine Learning and Deep Learnin...
收藏 引用
2nd International Conference on cyber Resilience, ICCR 2024
作者: Saeed, Nouf Majid Sultan Eid Ibrahim, Amer Ali, Liaqat Al-Dmour, Nidal A. Mohammed, Abdul Salam Ghazal, Taher M. American University In The Emirates Dubai United Arab Emirates College Of Engineering And Technology University Of Science And Technology Of Fujairah Fujairah United Arab Emirates College Of Engineering Mutah University Department Of Computer Engineering Jordan Skyline University College University City Sharjah Shariah United Arab Emirates Khalifa University Centre For Cyber Physical Systems Computer Science Department United Arab Emirates Center For Cyber Security Faculty Of Information Science And Technology Selangor Bangi43600 Malaysia
The dynamic nature of cyber threats offers a continual problem in the field of cybersecurity in the context of the expanding internet environment. This study provides an in-depth assessment of the literature on machin... 详细信息
来源: 评论