咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,464 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 1,017 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 285 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,073 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2532 条 记 录,以下是261-270 订阅
排序:
Empirical Method for Thyroid Disease Prediction Using a Deep Learning Techniques  8
Empirical Method for Thyroid Disease Prediction Using a Deep...
收藏 引用
8th IEEE International Conference for Convergence in Technology, I2CT 2023
作者: Reddy, Reddyvari Venkateswara Monisha, G.S. Ali, Ahmed Mudassar Yamini Devi, Palivala Madhusudhan, M.V. Sucharitha, Yadala CMR College of Engineering & Technology CSE-Cyber Security Hyderabad India Panimalar Engineering College Computer Science and Engineering Chennai Poonamalle India S. A. Engineering College Inforormation Technology Chennai India Vignana Bharathi Institute of Technology Computer Science and Engineering Hyderabad India Presidency University Computer Science and Engineering Bengaluru India VNR Vignana Jyothi Institute of Engineering and Technology Computer Science and Engineering Hyderabad India
Thyroid issues are quite general, effecting millions of people across the globe. The thyroid gland is susceptible to a wide range of illnesses, including hypothyroidism, hyperthyroidism, and malignancy. The symptoms o... 详细信息
来源: 评论
Generalized Polarization-Spatial Modulation With Multi-Mode Transmission
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 18570-18581页
作者: Li, Jun Li, Shuangyuan Dang, Shuping Chen, Xuan Chen, Chuanxi Peng, Yuyang Yu, Ling Guangzhou University Research Center of Intelligent Communication Engineering School of Electronics and Communication Engineering Guangzhou510006 China Guangdong Provincial Hospital of Chinese Medicine Guangzhou510120 China University of Bristol School of Electrical Electronic and Mechanical Engineering BristolBS8 1UB United Kingdom Fujian Normal University College of Computer and Cyber Security Fuzhou350007 China Macau University of Science and Technology School of Computer Science and Engineering Taipa999078 China State Key Laboratory of Traditional Chinese Medicine Syndrome Guangzhou510120 China
Polarization-spatial modulation (PSM) has been recently proposed to improve the system performance and energy efficiency of the conventional polarization modulation (PM) by activating only a single dual-polarized (DP)... 详细信息
来源: 评论
EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 358-366页
作者: Chintan Patel Ali Kashif Bashir Ahmad Ali AlZubi Rutvij Jhaveri School of Artificial Intelligence Information Technology and Cyber SecurityRashtriya Raksha UniversityGujaratIndia Department of Computing and Mathematics Manchester Metropolitan UniversityUnited Kingdom Woxsen School of Business Woxsen UniversityIndia Department of Computer Science and Mathematics Lebanese American UniversityBeirutLebanon Computer Science Department Community CollegeKing Saud UniversityP.O.Box 28095Riyadh11437Saudi Arabia Department of Computer Science and Engineering School of TechnologyPandit Deendayal Energy UniversityGujaratIndia
Industrial IoT(IIoT)aims to enhance services provided by various industries,such as manufacturing and product *** suffers from various challenges,and security is one of the key challenge among those *** and access con... 详细信息
来源: 评论
Novel optimal region based robust watermarking using modified dragonfly optimization algorithm
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第2期17卷 851-858页
作者: Shamna, N.V. Kaur, Puneet Raghavendra Patil, G.E. Krishna, Nanditha P A College of Engineering Dept of CSE (IoT & amp Cyber Security including Blockchain Technology) Karnataka India EEE UIET Panjab University Chandigarh India Department of Computer Science and Engineering Faculty of Engineering and Technology Jain Deemed-to be University Karnataka Bengaluru 562112 India Department of Medical Electronics Engineering Dayananda Sagar College of Engineering Bengaluru India
The growing concern about unauthorized access and tampering with digital images requires the development of robust and secure watermarking methods. Traditional approaches frequently struggle with achieving a balance b... 详细信息
来源: 评论
SAND: semi-automated adaptive network defense via programmable rule generation and deployment
收藏 引用
science China(Information sciences) 2022年 第7期65卷 121-138页
作者: Haoyu CHEN Deqing ZOU Hai JIN Shouhuai XU Bin YUAN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabHubei Engineering Research Center on Big Data Security School of Cyber Science and EngineeringHuazhong University of Science and Technology Department of Computer Science University of Colorado at Colorado Springs
cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is t... 详细信息
来源: 评论
Artificial Intelligent based Cost Optimized Smart Energy Distribution and Management  2
Artificial Intelligent based Cost Optimized Smart Energy Dis...
收藏 引用
2nd IEEE International Conference on Emerging Research in Computational science, ICERCS 2024
作者: Anitha, R. Siva Prasad, G. Senthil, M. Sarfaraz Ahmed, A. Raja, Laxmi Vijayakumar, S.D. Government Engineering College Department of Electronics and Communication Engineering Kerala India QIS College of Engineering and Technology Department of Computer Science and Engineering Andhra Pradesh India Sri Eshwar College of Engineering Department of Computer Science and Engineering Tamil Nadu Coimbatore India Karpagam Academy of Higher Education Department of Cyber Security Coimbatore India Builders Engineering College Department of Electronics and Communication Engineering Tamil Nadu India
The ever-increasing need for energy, along with the requirement to cut emissions of greenhouse gases and maximize efficiency in energy use, has been a driving force behind the development of cutting-edge technology in... 详细信息
来源: 评论
ML-assisted security for Anomaly Detection in Industrial IoT (IIoT) Applications  2
ML-assisted Security for Anomaly Detection in Industrial IoT...
收藏 引用
2nd International Conference on Smart Technologies for Smart Nation, SmartTechCon 2023
作者: Konatham, Bharath Reedy Simra, Tabassum Ghimire, Ashutosh Amsaad, Fathi Ibrahem, Mohamed I. Jhanjhi, N.Z. Department of Computer Science and Engineering Wright State University DaytonOH United States Department of Cyber Security Engineering George Mason University FairfaxVA United States School of Computer Science SCS Taylor’s University Subang Jaya47500 Malaysia
The industrial Internet of Things (IIoT) uses intelligent sensors and actuators, etc., to facilitate the application of IoT in different industries. This paper presents a comparative analysis using several machine lea... 详细信息
来源: 评论
Traceable Attribute-Based Keyword Search Scheme for Distributed Data Storage under Fog Computing-Based Social Internet of Vehicles
收藏 引用
IEEE Transactions on Cognitive Communications and Networking 2025年
作者: Gu, Ke Qiu, Juan Peng, Xin Li, Xiong Changsha University of Science and Technology School of Computer and Communication Engineering Changsha410114 China University of Electronic Science and Technology of China Institute for Cyber Security School of Computer Science and Engineering Chengdu611731 China
In Social Internet of Vehicles (SIoVs), vehicles frequently need to obtain their required data, thus many secure data acquisition schemes were proposed in cloud computing-based SIoVs. However, the distributed data sto... 详细信息
来源: 评论
Deep Learning Cost-Effective Evaluation Metrics
Deep Learning Cost-Effective Evaluation Metrics
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Zhao, Jian Zhao, Zisong Shi, Lijuan Kuang, Zhejun Wang, Runmin Li, Haixia College of Cyber Security Changchun University Changchun China College of Electronic Information Engineering Changchun University Changchun China College of Computer Science and Technology Changchun University Changchun China
Deep learning has been a driving force behind recent breakthroughs in artificial intelligence. In particular, neural networks have shown great promise in handling a wide range of tasks. With the improvement of perform... 详细信息
来源: 评论
AOCC-FL: Federated Learning with Aligned Overlapping via Calibrated Compensation  42
AOCC-FL: Federated Learning with Aligned Overlapping via Cal...
收藏 引用
42nd IEEE International Conference on computer Communications, INFOCOM 2023
作者: Wang, Haozhao Xu, Wenchao Fan, Yunfeng Li, Ruixuan Zhou, Pan Huazhong University of Science and Technology School of Computer Science and Technology Wuhan China The Hong Kong Polytechnic University Department of Computing Hong Kong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan China
Federated Learning enables collaboratively model training among a number of distributed devices with the coordination of a centralized server, where each device alternatively performs local gradient computation and co... 详细信息
来源: 评论