咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,466 篇 工学
    • 1,206 篇 计算机科学与技术...
    • 1,019 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 593 篇 理学
    • 287 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,080 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2539 条 记 录,以下是291-300 订阅
排序:
Frequency Analysis Attack on Ceaser Cipher using Quantum Support Vector Machine
Frequency Analysis Attack on Ceaser Cipher using Quantum Sup...
收藏 引用
2022 IEEE Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation, IATMSI 2022
作者: Ajith, Vishnu Mathews, Mahima Mary Panchami, V. Computer Science and Engineering Iiit Kottayam Kerala Pala India Cse - Cyber Security Iiit Kottayam Kerala Pala India
Quantum technology accelerated computing may have the capacity to provide solutions that are much better compared to their best known classical solutions. Quantum Algorithms reducing the complexity of problems like fa... 详细信息
来源: 评论
Enhanced CNN-DCT Steganography: Deep Learning-Based Image Steganography Over Cloud
收藏 引用
SN computer science 2024年 第4期5卷 408页
作者: Ahmad, Shahnawaz Ogala, Justin Onyarin Ikpotokin, Festus Arif, Mohd. Ahmad, Javed Mehfuz, Shabana School of Computer Science Engineering and Technology Bennett University Uttar Pradesh Greater Noida 201310 India Department of Cyber Security University of Delta Agbor Nigeria Department of Computer Science Ambrose Alli University Edo State Ekpoma Nigeria Department of CSE School of Computing Science and Engineering Galgotias University Uttar Pradesh Greater Noida 203201 India Department of Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida 201310 India Department of Electrical Engineering Jamia Millia Islamia New Delhi 110025 India
Image steganography plays a pivotal role in secure data communication and confidentiality protection, particularly in cloud-based environments. In this study, we propose a novel hybrid approach, CNN-DCT Steganography,... 详细信息
来源: 评论
Privacy-Aware Artificial Intelligence with Homomorphic Encryption using Machine Learning
Privacy-Aware Artificial Intelligence with Homomorphic Encry...
收藏 引用
2023 International Conference on Sustainable Computing and Smart Systems, ICSCSS 2023
作者: Srinivasa Rao, B. Chattopadhyay, Saumitra Singh, Prashant Hazela, Bramah Sabarinathan, G. Yamini, Kalva Department of Computer Science and Engineering Bachupally Telangana Hyderabad India Graphic Era Hill University Department of Computer Science and Engineering Dehradun India Amity University Amity School of Engineering and Technology Lucknow Department of Computer Science and Engineering Uttar Pradesh India Psna College of Engineering and Technology Department of Mathematics Tamilnadu Dindigul India Sri Ramachandra Institute of Higher Education and Research Cyber Security in Computer Science and Engineering Tamilnadu Chennai India
Along with the expansion of machine learning (ML) applications, the amount of data required to create predictions increases. Big-data ML has always been limited by off-chip memory capacity and computational speed. Con... 详细信息
来源: 评论
IDEA-PTLMS: Designing Secure Image Encoding and Decoding Algorithms using Pixel Transposition and Logistic Map based Substitutions
IDEA-PTLMS: Designing Secure Image Encoding and Decoding Alg...
收藏 引用
Electrical, Electronics, Information and Communication Technologies (ICEEICT), International Conference on
作者: Prajwal N Halvi Prajwalasimha S N Durbadal Chattaraj Naveen Kulkarni Deepthika Karuppusamy Department of Computer Science and Engineering (Cyber Security) School of Engineering (SoE) Dayananda Sagar University Bangalore India
In this paper, a hybrid approach based on Pseudo Hadamard transformation and Logistic Substitution is proposed. Inter pixel redundancy and strong correlation between the adjacent pixels in an image is condensed by imp... 详细信息
来源: 评论
Universal Watermark Vaccine: Universal Adversarial Perturbations for Watermark Protection
Universal Watermark Vaccine: Universal Adversarial Perturbat...
收藏 引用
2023 IEEE/CVF Conference on computer Vision and Pattern Recognition Workshops, CVPRW 2023
作者: Chen, Jianbo Liu, Xinwei Liang, Siyuan Jia, Xiaojun Xun, Yuan Hunan University College of Computer Science and Electronic Engineering Hunan China Chinese Academy of Sciences Institute of Information Engineering Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China
As computing ability continues to rapidly develop, neural networks have found widespread use in various fields. However, in the realm of visible watermarking for image copyright protection, neural networks have made i... 详细信息
来源: 评论
ZKCross: An Efficient and Reliable Cross-Chain Authentication Scheme Based on Lightweight Attribute-Based Zero-Knowledge Proof  1
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xu, Yuwei Cai, Hailang Chen, Jialuo Xiang, Qiao Xu, Jingdong Cheng, Guang School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China School of Informatics Xiamen University Xiamen China College of Computer Science Nankai University Tianjin China
The consortium blockchain finds wide application in finance and logistics. However, these independent networks create information silos. Cross-chain authentication aims to bridge these gaps. It verifies qualifications... 详细信息
来源: 评论
Investigation of Red Fox Algorithm for Solving Task Assignment Problem in Heterogeneous Unmanned Aerial Vehicle Swarm  3
Investigation of Red Fox Algorithm for Solving Task Assignme...
收藏 引用
3rd International Conference on Artificial Intelligence For Internet of Things, AIIoT 2024
作者: Manaswitha, K. Issac, Titus Silas, Salaja Terance, J Sebastian Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Coimbatore India Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Division of Artificial Intelligence and Machine Learning Karunya Institute of Technology and Sciences Coimbatore India
In recent years, there have been significant advancements in Unmanned Aerial Vehicles (UAVs), leading to their integration into everyday life. UAVs are constrained by limited energy, communication, and localization. T... 详细信息
来源: 评论
AI-Driven Intelligent IoT Systems for Real-Time Food Quality Monitoring and Analysis  2
AI-Driven Intelligent IoT Systems for Real-Time Food Quality...
收藏 引用
2nd IEEE International Conference on Trends in Quantum Computing and Emerging Business Technologies, TQCEBT 2024
作者: Krishnan, Prabhakar Ebenezar, U. Samson Ranitha, R. Purushotham, N. Balakrishnan, T. Suresh Amrita Vishwa Vidyapeetham Center for Cyber Security Systems and Networks Amritapuri campus India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Care College of Engineering Department of Computer Science and Engineering Tamil Nadu Trichy India Mohan Babu University Department of Computer Science and Engineering Mr.palliAP India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Chennai India
The system will monitor and analyse food quality along the supply chain in real time. The system has high performance due to the CNN algorithms. In terms of accuracy, CNN has a high performance (95.2%), precision (92.... 详细信息
来源: 评论
CHESS: Optimizing LLM Inference via Channel-Wise Thresholding and Selective Sparsification
CHESS: Optimizing LLM Inference via Channel-Wise Thresholdin...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: He, Junhui Wu, Shangyu Wen, Weidong Xue, Chun Jason Li, Qingan Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China School of Computer Science Wuhan University China MBZUAI United Arab Emirates City University of Hong Kong Hong Kong
Deploying large language models (LLMs) on edge devices presents significant challenges due to the substantial computational overhead and memory *** sparsification can mitigate these resource challenges by reducing the... 详细信息
来源: 评论
Assessing the Effects of Blackhole Attacks on MANET Reliability and security
Assessing the Effects of Blackhole Attacks on MANET Reliabil...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Fadhil, Saif Aamer Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Baghdad10011 Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Mobile Ad Hoc Networks (MANETs) are characterized by some important attributes, including infrastructure, mobile, and dynamic nature, which makes them have vast applications in different areas of computer networks. Th... 详细信息
来源: 评论